Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,055,570 papers from all fields of science
Search
Sign In
Create Free Account
Identity verification service
Known as:
Identity Verification Services
, Identity service
, Identity verification
An identity verification service is used by businesses to ensure that users or customers provide information that is associated with the identity of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Credit bureau
Identity management
Identity management system
Knowledge-based authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
DeepIris: Learning pairwise filter bank for heterogeneous iris verification
Nianfeng Liu
,
Man Zhang
,
Haiqing Li
,
Zhenan Sun
,
T. Tan
Pattern Recognition Letters
2016
Corpus ID: 27598220
Highly Cited
2011
Highly Cited
2011
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
Arik Messerman
,
Tarik Mustafic
,
S. Çamtepe
,
S. Albayrak
International Joint Conference on Biometrics…
2011
Corpus ID: 15993747
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication…
Expand
Highly Cited
2010
Highly Cited
2010
Cell phone-based biometric identification
Jennifer R. Kwapisz
,
Gary M. Weiss
,
Samuel Moore
International Conference on Biometrics: Theory…
2010
Corpus ID: 3189450
Mobile devices are becoming increasingly sophisticated and now incorporate many diverse and powerful sensors. The latest…
Expand
Highly Cited
2010
Highly Cited
2010
The Symbiotic Sustainability Model: Conceptualizing NGO–Corporate Alliance Communication
M. Shumate
,
A. O’Connor
2010
Corpus ID: 7748877
We introduce the Symbiotic Sustainability Model (SSM) as a macrolevel explanation of nongovernmental organization (NGO)–corporate…
Expand
Highly Cited
2008
Highly Cited
2008
Physical-Layer Authentication
Paul L. Yu
,
J. Baras
,
Brian M. Sadler
IEEE Transactions on Information Forensics and…
2008
Corpus ID: 11943555
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures…
Expand
Review
2007
Review
2007
Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities
M. Ma
,
Ritu Agarwal
Information systems research
2007
Corpus ID: 12550617
A variety of information technology (IT) artifacts, such as those supporting reputation management and digital archives of past…
Expand
Highly Cited
2005
Highly Cited
2005
Finger surface as a biometric identifier
D. Woodard
,
P. Flynn
Computer Vision and Image Understanding
2005
Corpus ID: 7133533
Highly Cited
2002
Highly Cited
2002
One-lead ECG for identity verification
T. Shen
,
Willis J. Tompkins
,
Y. Hu
Proceedings of the Second Joint 24th Annual…
2002
Corpus ID: 58704227
This research investigates the feasibility of using the electrocardiogram (ECG) as a new biometric for human identity…
Expand
Review
1991
Review
1991
Dynamic Identity Verification via Keystroke Characteristics
J. Leggett
,
Glen Williams
,
Mark Usnick
,
Mike Longnecker
Int. J. Man Mach. Stud.
1991
Corpus ID: 45258973
Highly Cited
1990
Highly Cited
1990
Identity authentication based on keystroke latencies
R. Joyce
,
G. Gupta
Communications of the ACM
1990
Corpus ID: 12175721
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE